Sciweavers

2995 search results - page 309 / 599
» On multi-avoidance of generalized patterns
Sort
View
85
Voted
ATAL
2009
Springer
15 years 7 months ago
Multiagent commitment alignment
Commitments provide a basis for understanding interactions in multiagent systems. Successful interoperation relies upon the interacting parties being aligned with respect to their...
Amit K. Chopra, Munindar P. Singh
106
Voted
FSTTCS
2009
Springer
15 years 7 months ago
Modelchecking counting properties of 1-safe nets with buffers in paraPSPACE
ABSTRACT. We consider concurrent systems that can be modelled as 1-safe Petri nets communicating through a fixed set of buffers (modelled as unbounded places). We identify a param...
M. Praveen, Kamal Lodaya
110
Voted
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 7 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
HT
2009
ACM
15 years 7 months ago
On hypertext narrative
Annals and chronicles may be the foundation of accounting, but writers of stories and histories have long known that they seldom render a satisfactory account of complex events. I...
Mark Bernstein
95
Voted
HT
2009
ACM
15 years 7 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer